Abstract

This article raises the question of decomposing the general task of automating steganographic analysis within the framework of ensuring information integrity control processes. Intensifying the use of steganography by attackers in information security incidents requires the development of a number of countermeasures, one of which is an automated software module for steganography. The article considers actual ways of using steganography in cyberattacks, formulates tasks and subtasks of stegoanalysis in the context of variability of steganographic techniques used. On the basis of the formulated tasks, the requirements to the methods of implementing the task of automated stegoanalysis were compiled, taking into account the specifics of various steganographic methods. The correspondence between applicable stegoanalysis methods and steganographic techniques, the use of which they are able to counteract, was established. On the basis of the conducted research, a conclusion about the possibility of logical breakdown of the general task of stegoanalysis into a number of related modules, the solution of each of which can be considered as a separate area has been made.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.